Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?

Answers

Answer 1

Answer:

The port that should be set open to allow users to access this new server is:

TCP port.

Explanation:

Ports are openings or entrance doors through which data packages have access to a PC or server.  TCP and UDP are transport protocols with port numbers.  TCP means Transmission Control Protocol.  They are used to connect two devices over the internet and other networks.  UDP means User Datagram Protocol.  They are used to connect applications and to speed the transfer of data.  Comparatively, UDP is faster, simpler, and more efficient than TCP.  TCP enables retransmission of lost data packets, which UDP cannot do.


Related Questions

What character, when used at the beginning of the constructor name in a class, makes the class variables have a scope limited to the function?

* (an asterisk)

# (a pound sign)

$ (a dollar sign)

_ (an underscore)

Answers

Answer:

_ (an underscore)

Explanation:

The underscore character.

__init_ and __str__ have double underscore characters at the beginning and end of the function name.

Correct answer edge 2020

Answer:

The answer to your question is _ (an underscore).

I hope this helps you out and I hope that you have a wonderful day.<3<3<3

Explanation:

8.3.9 Text to Binary Python

Answers

Using the knowledge in computational language in python it is possible to write a code that write the binary code

Writting the code:

#function that will convert the text to binary

def text_to_binary(text):

   #variable to store the converted binary value

   binary_text = ""

   #iterate for each character in the text

   for i in text:

       #get the ASCII value of that character

       ascii = ord(i)

       #call the function to get the value of the

       #current ascii number and append it to the

       #binary_text

       binary_text += decimal_to_binary(ascii)

   #return the final converted binary value

   return binary_text

def decimal_to_binary(decimal_value):

   binary_base = 2

   num_bits_desired = 8

   binary_value = str(bin(decimal_value))[2:]

   while len(binary_value) < num_bits_desired:

       binary_value = "0" + binary_value

   return binary_value

text = input("Input the string you would like to encode: ")

binary = text_to_binary(text)

print(binary)

See more about python at brainly.com/question/18502436

#SPJ1

What is included in a linked list node?

I a reference to the next node
II an array reference
III a data element

Answers

Answer: I a reference to the next node

III a data element

Explanation:

A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.

In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.

Therefore, based on the explanation above, the correct option will be:

I. a reference to the next node

III a data element

the acronym PC stands of​

Answers

Answer:

personal computer

Explanation:

It stands for personal computer

Question # 1

Multiple Choice

What will be the output of the following program?

def average(a, b):

total = a + b

return total / 2


ave = average(7,11)

print("Total", total)

print ("Average", ave)



A. an error statement since total's scope is limited to the average function.
B. Total 18
​Average 9
C. Total18
​Average9
D. an error statement since average is a keyword.

Answers

Answer:

an error statement since total's scope is limited to the average function.

Explanation:

The scope of total is the function average. Code outside of the function does not have access to its value.

Correct answer edge 2020

Answer:

an error statement since total's scope is limited to the average function.

Explanation:

The scope of total is the function average. Code outside of the function does not have access to its value.

Correct answer edge 2020

Janitor and Cashier classes have a print function that is similar. How can we refactor this code to reduce repetition?

Answers

A sample code to show how to refactor a code to reduce repetition if two classes have a print function that is similar:

The Code

public abstract class DeviceMessageBase

{

   public void Connect()

   {

      // do connect things

   }

   public void WaitMessage()

   {

       // do wait message things

   }

   public void ParseMessage()

   {

       // do parse message things

   }

   public abstract void ProcessMessage();

}

public class DeviceMessageNavigator : DeviceMessageBase

{

   public override void ProcessMessage()

   {

       //**//NAVIGATE MESSAGE(Pass it to somewhere else)**

   }

}

public class DeviceMessagePrinter : DeviceMessageBase

{

   public override void ProcessMessage()

   {

       //**//PRINT MESSAGE**

   }

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

How is opera diffrerent from blues,gospel,and country music?

Answers

Answer: Opera has its roots in Europe; the other styles are American

Explanation:

select the correct answer​

Answers

Could you possibly get a clearer picture, and also the options for the answer?

Unitary method question 1) If the cost of 32 copies is Rs 960, how much more cost is of 3 dozen copies ?​

Answers

Answer:

the cost of 3 dozen copies is Rs 1080.

Explanation:

32 copies =Rs 960

1 copy =Rs 960÷32

= Rs 30

3 dozen = 3 × 12. =36

36 copies = 36 × 30

= Rs 1080

the basis of modern technology is traditional technology​

Answers

Answer:

A customized innovation is of specialized advances where some unique things are added to extend it. The present day advances have been based on the fundamental structures purposes and working of the traditional technologies.

Hence, it can be concluded that “The basis of modern technology is traditional technology”

Imani needs to copy text from one document into another document. She needs the pasted text to retain its original appearance. When she pastes the text, she should use which of the following settings?

Keep Text Only

Use Destination Theme

Merge Formatting

Keep Source Formatting

Answers

Answer:

Keep Text Only

Explanation:

Because why would it be any of the other ones so it would be that

Imani must transfer text from one paper to another. She ought to preserve the formatting from the original content when she pastes it. Hence, option D is correct.

What is a Document?

A file produced by a software program is a computer document. Originally used to describe only word processing documents, the term "document" is now used to describe all saved files. Text, photos, music, video, and other sorts of data can all be found in documents.

An icon and a filename are used to identify documents. The filename gives the file a specific name, whereas the icon depicts the file type visually. The majority of filenames for documents also contain a file extension, which indicates the file type of the document. For instance, a Photoshop document might have a.PSD file extension, whereas a Microsoft Word document would have a.DOCX file extension.

To get more information about Document :

https://brainly.com/question/2901657

#SPJ6

What is the missing line of code?
class vehicle:
self.model = strModel
self.color = strColor
def
_str_(self):
return self.model +
+ self.color

Answers

Answer:

def__init__(self,strModel,strColor):

Typically you will not find biometric devices in _________ security buildings. Low High Minimal Medium

Answers

Answer:

Low

Explanation:

Biometrics security systems are hardware scanners that are useful for capturing the biometric of individuals as a means of verifying identity. These scans would be matched against the saved database and in turn access would be approved or denied to the system. In other words, biometric security gives the human body the “key” to unlock your access into buildings.

You will not find such devices in low security buildings.

this is computer programming and it confuses me very much

Answers

Answer:

Using a loop or using the power function from a math library.

Explanation:

Really the question needs a bit more context. But if you want to calculate [tex]a^{b}[/tex]

and b is a whole number, you could create a loop with b steps and keep multiplying by a.

Alternatively, you can use a power function such as pow(a,b) from math.h in the C programming language.

HELP
Question 1 (1 point)
GIF, JPG, and TIFF are raster-based.
O True
O False

Answers

It is true. GIF and JPG are mostly rasted (can be a vector), and TIIFF is rasted.

The Internet began when a large company wanted to sell products online.

True
or
False

Answers

Answer:

True

Explanation:

Answer:

It would be true

Explanation:

PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT

Answers

Answer:

B

Explanation:

I think that is the right answer

africans are unique people they are rich culture and a glorious history​

Answers

Explanation:

In Africa art including crafts and culture, mythology and faith, clothes, lifestyle, music and tongues, African pixel is influenced. In Africa, social identities are plentiful, with vast quantities of multiculturalism being discovered not only through various continents, as well as within individual nations.

To specify your preferred colors, fonts, and effects for a document, which of the following should be done?

1.Create custom theme fonts

2.Create custom theme

3.Create a custom paragraph style

4.Create a custom character style

Answers

Answer: crest custom theme

Explanation:

Answer:

crest custom theme

Explanation:

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Answers

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
A. O(N)
B. O(logN)
C. O(logN)+O(N)
D. O(NlogN)

Answers

Answer:

D. O(NlogN)

Explanation:

The computation of the overall algorithm cost is as follows:

Given that

O(logN) + O(N) × O(logN) + 1

In the case of complexity we considered the high order that dominates the other terms

Thus, that term would be  

O(N) × O(logN)

It could be rewrite as

O(NlogN)

Hence, the correct option is D.

All the other options are wrong

Answer:

D. O(NlogN)

Explanation:

the overall algorithm cost would be: O(NlogN).

assembly language uses _____ coder for programming.

Answers

Answer:

Assembly language uses alphabetic codes in place of binary numbers used in machine language. assembly language code is converted into executable machine code by a utility program referred as assembler.

> var direction = []; directions.push("walk to corner");//1 directions.push("turn right");//2 directions.push("walk one block");//3 directions.push("turn left");//4 directions.push("walk to gray house");//5 directions.push("go down the strairs");//6 directions.push("knock on the pink door");//7 console.log(directions); "knock on the pink (7) ["walk to corner", "turn right", "walk one block", "turn left", "walk to the gray house", "go down the astairs" door",]

is dis code correct​

Answers

Answer:

no it's not correct.........

Environment varies firm to firm
of
Select one:
O True
tion
False

Answers

Answer:

true

...................

project members are called change agents. why?

Answers

A project members are called change agents because  they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.

What does being a change agent mean?

In regards to business, a change agent is known to be called any body be it a man or a woman that helps to  promotes as well as supports a new method of doing things inside of the company, even if it is the use of a new method, the taking in of a new management structure or the changing of an old business model to those of a new one.

Therefore, based on the above, A project members are called change agents because  they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.

Learn more about project members from

https://brainly.com/question/24248709
#SPJ1

Give five (5) words that describes about computer.​

Answers

multi-purpose
electronic
Accuracy
Speed
Diligence

Explanation:

C=Commonly

O=Operated

M=Machine

P=Particularly

U=Used for

T=Training

E=Education

R=Research

hope it helps you

Which steps can you take to remove all the data you've just typed from a cell?
Click the cell, then press Delete.
Click Undo on the Quick Access Toolbar.
Click Cut on the Clipboard group.
Press Ctrl+Z.
Press Ctrl+Shift.

Answers

Explanation:

Ctrl+Z

Click and press Delete

Click Undo

how do i create a business process flow chart?

Answers

Answer:

Determine the main components of the process. ...

Order the activities. ...

Choose the correct symbols for each activity. ...

Make the connection between the activities. ...

Indicate the beginning and end of the process. ...

Review your business process diagram.

Explanation:

The term structure, as it relates to programming, refers to the decisions you make to design your program to best meet its objective. Coral provides features to create clean, efficient code. How can the basic if/elseif/else control statements help meet structural design objectives in your code?

Answers

Answer:

Explanation:

if/elseif/else control statements help accomplish efficient code since it provides a condition. The program analyzes the code and determines if certain criteria are met, if so then it continues down a certain pre-defined path   which would be the most efficient path towards the main program objective. If these criteria are not met then the code would follow the next most efficient path. This is all controlled through if/elseif/else statements. They ultimately provide various options for reaching the final objective in an order of most efficient to least efficient.

What is machine learning?

Answers

Machine learning is to learn the use and development of computer systems. In simple words it means a type of artificial intelligence that allows software applications to become more accurate at predicting outcomes, without being explicitly programmed
Other Questions
A feature of an organism. A carton has a length of fraction 2 and 2 over 3 feet, width of fraction 1 and 1 over 8 feet, and height of fraction 1 and 1 over 5 feet. What is the volume of the carton?fraction 3 and 3 over 5 cubic feetfraction 4 and 1 over 5 cubic feetfraction 5 and 2 over 5 cubic feetfraction 7 and 1 over 5 cubic feet please answer accurately what is the value of x?help would be so appreciated! Find the value of the variable p and YZ if Y is between X and Z, XY=3p, YZ=2p-1, and XZ=6p-6 The temperature at 6:00 A.M. 58 degrees Fahrenheit. The temperature increased at a constant rate of 3 degrees Fahrenheit every hour until 10:00 A.M. The equation below models t as a function of h where t is temperature and h is hours. t=58+3h which set represents the range of this function. a.{h:0h4} b.{h:0h12} c.{t:58t70} d.{t:0t70} Helpp!!! Will give brainliest!! Help me out from 25-32 also show work (Geometry) Graph the following equations and determiny=-2x + 66x+3y=18 geometry help please How many prime numbers in total are known as of November 2020?No answer needed, just take the points. who is writer of ashtang yoga?which experience do you feel from it? How did bank runs/bank failures contribute to the Great Depression? help meh then i give you sum huge amount of points! Carlos purchased four pounds of oranges for $3.20. He later realized he needed nine pounds. How much more money will he need to spend to bring his total up to nine pounds? 1011For questions 6-8, determine the number of solutions.Type your answers as one, none, or many (no capital letters)64(x + 5) - 2 = 18 + 4x if anyone is on a Chromebook, do you ever mean to press backspace, then you accidentally press the power button and think "OH CRA,P there goes all that work!" but then it doesn't turn off. does anybody else feel my pain? Identify the property of equality that justifies the missing step in solving the equation below 1-Rodrigo spent $1.47 to buy 3 red balloons. The balloons all had the same price. How much did each balloon cost? Laura's yard is in the shape of a square and a half-circle. She just got a puppy named Sprinkles for her birthday. In order to keep him safe, she wants to line the perimeter of her yard with a fence. How much fencing will she need to enclose the entire yard and keep Sprinkles from running away?